Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Generate public key with standard curve 'secp256r1'(NIST Curve P-256 ) #34

Open
hamedaakhlaghi opened this issue Nov 19, 2018 · 7 comments

Comments

@hamedaakhlaghi
Copy link

hamedaakhlaghi commented Nov 19, 2018

How can I generate a public key with specific domain parameters (a, b, p, x, y, n, h) according to secp256r1

@hamedaakhlaghi hamedaakhlaghi changed the title Generate public key with secp256r1 Generate public key with standard curve 'secp256r1'(NIST Curve P-256 ) Nov 19, 2018
@hfossli
Copy link
Contributor

hfossli commented Nov 19, 2018

I have not done that before. Do you want to do that whilst storing the private key on secure enclave? I don't think that is possible.

You could create a key pair outside of the sdk and import the public key to the sdk. I can help you with importing.

@hamedaakhlaghi
Copy link
Author

I saw secp256r1 in the readme, I thought your library support this standard. I don't want to store public or private, I need to generate public key with secp256r1.

@hfossli
Copy link
Contributor

hfossli commented Nov 20, 2018

Yes, it supports the same configuration for secp256r1 as Security framework from Apple provides of support. I don't think I can help you further than that. Maybe if you share some pseudo code?

@Sajjon
Copy link

Sajjon commented Apr 9, 2019

@hamedaakhlaghi I support secp256r1 in EllipticCurveKit

@hamedaakhlaghi
Copy link
Author

@Sajjon Thanks, My problem resolved

@hfossli
Copy link
Contributor

hfossli commented Apr 17, 2019

How did you resolve?

@hamedaakhlaghi
Copy link
Author

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants